Top Rated VeraCrypt Alternatives
51 VeraCrypt Reviews
Overall Review Sentiment for VeraCrypt
Log in to view review sentiment.

With the development of technology and software, the number of threats we may encounter is continuously increasing, with some consumers demanding more. "You own a company that wants to keep privileged information confidential or just a person who cares about security, encryption adds a whole new security component to your personal information. Encryption rewrites your files into hidden code, requiring access to a password to unlock them. There are many brands of encryption software available today, but many of them are expensive and scaled only to meet the requirements of large companies. Unlike software such as BitLocker, VeraCrypt does not require a Windows Pro or Enterprise version to work, and its versatility makes it scalable to your needs, regardless of whether you want to encrypt a single file or the entire computer disk. VeraCrypt is intended to be used in all versions of the Windows operating system but also works well on Linux and macOS distributions.
The codes used to hide files are called ciphers, and no two are created in the same way. TwoFish, Serpent, and AES are supported in VeraCrypt and are considered one of the most reliable ciphers. VeraCrypt is also an open-source project. This offers several significant advantages. Because everyone can work with VeraCrypt, the tools it runs on are more transparent, and security gaps can be identified and fixed more effectively thanks to this higher level of control. Review collected by and hosted on G2.com.
Requires installation, configuration, and a certain level of encryption knowledge to choose the optimal configuration. Review collected by and hosted on G2.com.

VeraCrypt is an open-source version of the TrueCrypt code that has been subsidized. A hardware encryption program allows you to unlock your disk drive and will not be able to access your data without knowing the password if someone exploits your phone. You can also create an encrypted folder that can be saved on your USB drive, Internet, or phone with your private files. I find it almost impossible to start with VeraCrypt while it still provides sophisticated user features; such as which authentication and hash algorithms you want to use. Review collected by and hosted on G2.com.
I would like there to be an application for iOS or Android mobile phones, but as I regret to say, there are no plans to create such versions. I hope this changes in the near future. Review collected by and hosted on G2.com.

VeraCrypt is an opensource variant of the subsidized TrueCrypt software. A hardware encryption software helps you to decrypt your computer drive, so that if someone hacks your device, they won't be able to reach your files without understanding the key. You may also build an encrypted folder with your private files that you can save on your thumb drive, internet, or phone. I find it nearly impossible to begin with VeryCrypt while it still provides advanced user sophisticated functionality (for example, what authentication and hashing algorithms you want to use). Review collected by and hosted on G2.com.
I'd be happier if there were a mobile app of the iOS or Android phone, but as I'm sad to note, there are no plans to create these models. I believe it is going to change in the near future. Review collected by and hosted on G2.com.

It is the real problem and has all the features of an open-source product, so any issue can be resolved as soon as it appears. From encrypting a complete operating system to the ability to create a second hidden operating system that cannot be traced. The same for creating an encrypted volume that can optionally contain a hidden volume that is undetectable. It even allows choosing the combination of hash algorithms, along with the possibility of using security tokens and smart cards. Review collected by and hosted on G2.com.
Unfortunately, it is not available on mobile platforms like Android and iOS, at least for encrypted volumes. This limits the use of the software to the desktop on Windows, Linux, and MAC. Review collected by and hosted on G2.com.

In order to protect our files and personal data, encryption is necessary. I always put my files in Dropbox or Google Drive, sometimes these files can be snooped on by state actors or hackers, and once they are in them they will be able to read all the sensitive documents of our business. Veracrypt helps me create an encrypted capsule protected by a password that can be sent to any server by email or uploaded, and gives us the peace of mind that it is not being spied on. Sometimes we handle the client's sensitive information on our end and they give us the data in the form of a Veracrypt volume, and this guarantees the security of the data. Review collected by and hosted on G2.com.
The user interface of Veracrypt is not polished, a user interface designer could be recruited to make the user interface more user-friendly. Veracrypt does not have a mobile or tablet application. A Gmail integration would be a blessing. Review collected by and hosted on G2.com.
VeraCrypt has been the most helpful tool for encrypting our files at work. I like how easy it is to make encrypted container/drives in VeraCrypt with just few steps. We always use VeraCrypt at work for our private business information/ data of our clients. Review collected by and hosted on G2.com.
I haven't been able to find any particular downside of this great software. It has worked perfectly for me without any issues as of now. Review collected by and hosted on G2.com.

Veracrypt is free, but users are encouraged to contribute to continuing the project going. The software is an on-the-fly encryption instrument, which implies that it only decodes documents when they are necessary and that the documents are otherwise kept encrypted the majority of the time. In addition, the technology supports cyphers for AES, TwoFish and Serpent cryptography. In the planning stages, Veracrypt is in constant development with regular updates and many external audits. In addition, operating systems such as macOS, Linux and Windows support Veracrypt. Review collected by and hosted on G2.com.
Veracrypt requires some knowledge and experience in tech, so some skill is necessary, especially if you face some issues. Several UEFI implementations in the Linux environment can cause problems in one, not in others, and the remedies are not uniform between problems. Review collected by and hosted on G2.com.

Veracrypt is an exceptional technology that enables you to encrypt files for storage. One of the key benefits is the ability to encrypt an infinite range of disks or portable devices with Veracrypt to allow you to safely transfer sensitive information between the workplace and residential. Veracrypt has several encoding techniques to choose from, and collectively provides users the capacity to build a hidden partition that is highly useful when sharing a laptop or needing to safely send information. The application has an accessible sourcecode, so it is supplied completely free for each person on the most popular systems. Users are provided with a chance of encrypting the device's partition. Review collected by and hosted on G2.com.
The most notable weakness of Veracrypt is an obsolete model that makes the system untransparent, so it can be challenging to find specific features. The configuration is quite difficult, and understanding the tool needs a lot of time. Review collected by and hosted on G2.com.

It is the real deal and has complete functionality in an open-source product so that issues can be resolved when they occur from encryption of an entire operating scheme to the capacity to build another untraceable hidden operating system. The same is true for the creation of an encrypted volume that can optionally contain an undetectable secret amount. It even enables you to combine Hash algorithms with the capacity to use safety tokens and smart cards. Review collected by and hosted on G2.com.
It is not accessible, at least on encrypted quantities on portable systems such as Android and iOS. This limits desktop-based software to Windows, Linux and MAC. Review collected by and hosted on G2.com.

Veracrypt is an excellent software that enables you to encrypt documents for storage. One of the key benefits is the ability to encrypt an infinite range of drives or portable devices with Veracrypt to allow you to safely move delicate information between the workplace and home. Veracrypt has several decoding technologies to choose from, and collectively offers users the option to generate a hidden disk that is extremely useful when sharing a computer or needing to securely send data. VeraCrypt is equipped with an available sourcecode, so it is given completely free for each user on the most common operating systems. There is also the possibility of encrypting the device's disk. Review collected by and hosted on G2.com.
The most notable problem of Veracrypt is an obsolete structure that leaves the gui untransparent, so it can be difficult to find specific features. The configuration is difficult, and understanding the device needs a lot of moment. Review collected by and hosted on G2.com.